Documentation | Flowtriq DDoS Detection API & Agent Setup
Detection, Mitigation & Response

Detect and mitigate DDoS attacks in under 1 second, respond automatically, and keep your users informed.

All features →
Learn
Documentation Quick Start API Reference Agent Setup DDoS Protection Landscape State of DDoS 2026 REPORT Free Certifications NEW
Research & Guides
Mirai Botnet Kill Switch Research memcached Amplification Dynamic Baselines PCAP Forensics PagerDuty Setup
Company
About Us Partners Whitelabel / Reseller Affiliate Program Pay with Crypto System Status
Legal & Support
Contact Us Terms Privacy SLA
Who Uses Flowtriq

From indie hosts to ISPs, see how teams like yours use Flowtriq to detect and stop DDoS attacks.

Talk to Us →
Infrastructure
Hosting Providers ISPs MSPs/MSSPs Small Operators Routers Edge Node Defense
Gaming
Game Server Hosting Game Studios
Business
SaaS Platforms E-Commerce Financial Services

Flow Collection (sFlow / NetFlow / IPFIX)

Ingest sFlow v5, NetFlow v5/v9, and IPFIX directly from your routers and switches for upstream DDoS visibility

Flow collection is configured per-node from the dashboard. It works alongside local /proc/net/dev detection. The agent uses whichever reading is higher for threshold comparison.

Overview

The ftagent natively ingests flow telemetry from your network infrastructure. Point your router's flow export at the agent and it processes flow records in real-time, giving you upstream visibility before attack traffic reaches the server. This is especially valuable for environments where packet capture is not feasible: cloud VPCs, managed infrastructure, and high-throughput 100G+ links.

Supported Protocols

ProtocolStandardDefault PortFormat
sFlow v5RFC 31766343Sampled packet headers with interface counters
NetFlow v5Cisco proprietary2055Fixed-format 48-byte flow records
NetFlow v9RFC 39542055Template-based with automatic template caching
IPFIXRFC 7011 (NetFlow v10)4739Template-based with enterprise information elements

The agent auto-detects the protocol version from incoming datagrams. You can also force a specific protocol in the per-node configuration.

How It Works

  1. UDP Listener: The ftagent starts a UDP listener on the configured port (per-protocol defaults above)
  2. Protocol Parsing: Binary parsers decode incoming datagrams. sFlow v5 sampled packet headers, NetFlow v5 fixed-format records, and NetFlow v9/IPFIX template-based records with automatic template caching
  3. Normalization: Flow records are normalized and aggregated into 1-second PPS/BPS windows, accounting for sample rate
  4. Merge: The detection loop compares flow-derived metrics with local /proc/net/dev readings and uses the higher value for threshold comparison
  5. Enrichment: During attacks, flow-sourced top source IPs and destination ports are included in the initial incident report for immediate visibility

Configuration

Flow collection is configured per-node from Dashboard → Nodes → [Node] → Flow Collection tab.

SettingDescriptionDefault
ProtocolWhich flow protocol to listen for (sflow, netflow5, netflow9, ipfix, auto)auto
Listen PortUDP port for incoming flow data6343 (sFlow), 2055 (NetFlow), 4739 (IPFIX)
Sample RateThe sampling rate configured on your router (used for PPS/BPS calculation)1:1000
Allowed Source IPsRestrict flow ingestion to specific router IPs (comma-separated)Any

Router Configuration Snippets

Copy-paste these into your router to start sending flow data to the ftagent.

Juniper (sFlow)

set protocols sflow collector <AGENT_IP> udp-port 6343
set protocols sflow interfaces ge-0/0/0
set protocols sflow polling-interval 10
set protocols sflow sample-rate ingress 1000

Cisco IOS-XE (NetFlow v9)

flow exporter FLOWTRIQ
 destination <AGENT_IP>
 transport udp 2055
 export-protocol netflow-v9
 template data timeout 60
!
flow monitor FLOWTRIQ-MON
 exporter FLOWTRIQ
 record netflow ipv4 original-input
!
interface GigabitEthernet0/0
 ip flow monitor FLOWTRIQ-MON input

MikroTik (NetFlow v9 / IPFIX)

/ip traffic-flow
set enabled=yes interfaces=ether1
/ip traffic-flow target
add dst-address=<AGENT_IP> port=2055 version=9

Recommended Sample Rates

Link SpeedRecommended Sample Rate
1 Gbps1:500
10 Gbps1:1000
40 Gbps1:2000
100 Gbps1:4096

Higher sample rates give more granular visibility but increase CPU usage on the router. For DDoS detection, 1:1000 is sufficient for most deployments.

Flow Mirroring

In addition to ingestion for detection, Flowtriq can mirror received flow data to additional destinations via UDP. This lets you feed the same telemetry to your existing NMS, SIEM, or capacity planning tools alongside Flowtriq. Configure mirror destinations from Dashboard → Nodes → [Node] → Flow Collection → Mirror.

Flow collection requires the ftagent to listen on a UDP port. Ensure your firewall allows inbound UDP on the configured port from your router IPs. Use the Allowed Source IPs setting to restrict ingestion to trusted sources.